Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp840262yba; Fri, 3 May 2019 11:18:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqxWkz4L29UV8GZmqBCZQawlWwJ5vKl2gx924LZRQ3Uiiyg9vx5bGsoeorjNbvEiVMJ/KIvA X-Received: by 2002:aa7:9089:: with SMTP id i9mr12843845pfa.115.1556907506727; Fri, 03 May 2019 11:18:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556907506; cv=none; d=google.com; s=arc-20160816; b=dayNPyTcHT9IN8yTkh4816+CTiDT6XQcFnptZILe+VnHVnNKOqq+uyeXvmAyUEF9U7 VnWxF0tkglpT2knODjaPZNKNds3wnQD48Y767v6W5hcQvZLW4n/H/48LsCTMoGHkgkRc xlEaWMED3uqPO0OREb3NU/dWHRN8TlixuRpr3CIqlkji+daNhRJ3ag6WcXiXA79DNJrO l9DqvWVY2sz8awy2dXC391cKI7cQvsoLxytX0HvgMEDKdVpGeyjJv2yBs3NgSv+sg6U/ uHzw8YD1hccad3QQKAhPGiCqc5Ay+BikTrObgtkLwo2cHhaA70LTSHPKLM4GRYT2w1nh k+2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=FwwKpD3uSNoOFlcgjRaZh20WCk4wqtxh0zC+plzB4pw=; b=ixl4+RSFHhcxV2dkhaS7wl5SCLDIIckxoRPPpXpJkhXeBIcC8eUurhk1tiC5hViq4w XB7DfZkVr5DMwdt8hczCINcjBJUaHamifrxxQTLVI3etel0JKjP20di+KWJfWS9Glk3f i8JFS3biYnPwGfYg8qcuK+5Ev2NWDkfeqjGYTiECEGh3WMmkUKNm3JDAiQuFgD5sFvPf 13svhuTkmGrYJzsaaxcLaWsAZgV+0BbXjpRshfqTBAElSvpt+OqAzi/oY7FkdDW4D5EV bUdofXzqKTW10LDPM94TOkcvS2i2qYn2++/2cMzSCUXEU89r+w/lNE2onLj63SVNP2ZM jwhA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=Cu4XJd4j; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a187si3191970pgc.385.2019.05.03.11.18.10; Fri, 03 May 2019 11:18:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=Cu4XJd4j; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728348AbfECSHq (ORCPT + 99 others); Fri, 3 May 2019 14:07:46 -0400 Received: from mail.skyhub.de ([5.9.137.197]:45632 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727221AbfECSHq (ORCPT ); Fri, 3 May 2019 14:07:46 -0400 Received: from zn.tnic (p200300EC2F0CA900ED4C00FAF1DC8C17.dip0.t-ipconnect.de [IPv6:2003:ec:2f0c:a900:ed4c:fa:f1dc:8c17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 92EBC1EC021C; Fri, 3 May 2019 20:07:44 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1556906864; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=FwwKpD3uSNoOFlcgjRaZh20WCk4wqtxh0zC+plzB4pw=; b=Cu4XJd4jGrp29+kEqnr+REiJv1Qd2B9YZMGQL2UaFxWfI5ulSgsbHfRtch5FWltjic14iM R1Aqhme6bHXuDEYP8AfIF2vhjUwFB6QII+qppOmUF8cnxd8Hu7CHr4jVy1M3jyIdIfNKpK HCMtvVT2Bgvrj+idGuaMF3C0kVTpAIA= Date: Fri, 3 May 2019 20:07:39 +0200 From: Borislav Petkov To: Paolo Bonzini Cc: Andy Lutomirski , Sebastian Andrzej Siewior , Greg KH , LKML , Rik van Riel , "H. Peter Anvin" , "Jason A. Donenfeld" , Ard Biesheuvel , Dave Hansen , Ingo Molnar , Nicolai Stange , Radim =?utf-8?B?S3LEjW3DocWZ?= , Thomas Gleixner , X86 ML , stable Subject: Re: [PATCH] x86/fpu: Remove the _GPL from the kernel_fpu_begin/end() export Message-ID: <20190503180739.GF5020@zn.tnic> References: <761345df6285930339aced868ebf8ec459091383.1556807897.git.luto@kernel.org> <20190502154043.gfv4iplcvzjz3mc6@linutronix.de> <20190502165520.GC6565@zn.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 03, 2019 at 11:21:15AM -0600, Paolo Bonzini wrote: > Your observation that the API only exists on x86 and s390 has no bearing > to whether the functions should be EXPORT_SYMBOL_GPL or EXPORT_SYMBOL. > ARM has kernel_neon_begin/end, PPC has enable/disable_kernel_altivec. > It's just that SIMD code is so arch-specific that nobody has bothered > unifying the namings (or, nobody considers the different names a problem > at all). This is actually proving my point: there wasn't any real agreement on what interfaces should be immutable so that out-of-tree code can use them and us guaranteeing they won't change. Instead, it was a random thing that just happened. So if you have to use them in some out-of-tree module, you'd have to do arch-specific hackery, obviously, because each arch does different things. So what happened is that out-of-tree module simply grabbed them and now when we change our implementation, we broke it. And I care about this why exactly? So let me cut to the chase: you and Andy are arguing about what exactly? * We should support out-of-tree code in general? * We should support out-of-tree code if/when ? * We should be free to change kernel interfaces and implementation as we see fit, without paying attention to some out-of-tree, probably license-incompatible, maybe even proprietary code? (I don't think it is that, though). * Something else I've missed. So before we waste any more time with this, let's agree on the rules first: do we support out-of-tree code and if so, how much and to what degree? This keeps happening so I think we should write it all down so that it is crystal clear to all parties involved what can and cannot be done. And then when we all agree, we can enforce those rules and then act accordingly when changing implementations. Maybe it is written down somewhere but I haven't found it yet so if you do, pls point me to it. -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.